Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Why cyber hygiene remains critical in the era of AI-driven threats
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

Cyber-attacks are an assumed inevitable for businesses today. As companies increasingly handle large amounts of valuable data, safeguarding operations has never been more important. Now, half (50%) of IT decision-makers report information security as their most time-consuming task[1].While AI offers a promising solution, security leaders must get the basics right first. Only by practicing good cyber hygiene can businesses counteract threats today.1: Establishing a cyber foundation  The rise of hybrid work has led to a significant increase in the number of devices and locations accessing company information. This distributed workforce reduces network visibility, leaving businesses with limited understanding of their overall internet exposure.Enforcing fundamental security measures, such as multi-factor authentication (MFA) and regular software updates and patching, should be non-negotiable components of any robust security strategy. Employees also must be educated around cybersecurity principles so they’re vigilant to potential threats.It may seem simple, but numerous attacks have happened not because of sophisticated AI-powered methods, but rather by malicious actors exploiting minor vulnerabilities.2: Measuring potential riskKnowing where, what, and how much data a business is storing is crucial to identifying potential vulnerabilities and restoring operations during an incident. Without this basic knowledge, businesses cannot effectively respond and safeguard valuable data and systems.A robust access management strategy is paramount, as human error often serves as the entry point for breaches. Maintaining up-to-date records of who can access documents is essential. Introducing MFA, working to zero-trust principles, and establishing centralised logins, access can be cross-referenced and integrated with physical security measures.3: Assessing emerging technology risksMany criminals are yet to take advantage of AI as traditional techniques continue to be effective. While the technology enhances the sophistication of cyberattacks, from generating convincing emails and even realistic voiceovers for calls, the underlying vulnerabilities remain the same. As such, maintaining strong cybersecurity hygiene is a fundamental defence, even with the threat of AI.Ongoing reliance on digital communication channels enhances the potential threat of AI-powered phishing attacks, particularly in the context of hybrid working which can create security neglect due to distance from the office. Educating staff around such threats can enhance vigilance to attacks and act as a first step to protecting business infrastructure.4: Creating an open cultureSecurity breaches can often cause shame amongst employees, while businesses fear reputational damage amongst partners and customers. This can lead to a culture of secrecy, where successful attacks are dealt with in the dark. But silence only benefits the attackers themselves.A zero-blame culture where employees are encouraged to report issues without fear of reprisal enables business to quickly respond to attacks. Likewise, when an organisation suffers an attack, a culture of openness should allow them to share their experience and learn from them.Cyber hygiene to cyber resilienceIn today’s risk landscape, organisations must assume they will face an attack eventually. Building cyber resilience begins with mastering the basics, from educating staff to ensuring an up-to-date access management strategy. While AI poses a new threat, these foundational principles remain a business’ most effective defence against the majority of attacks today.Find out more about Canon’s Information Security Solutions.


[1] Information Management research report Canon

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3820782/why-cyber-hygiene-remains-critical-in-the-era-of-ai-driven-threats.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link